AUTHOR ARCHIVES

Rebecca Greenfield

Results 41-50 of 178

Do You Need to Meet Everyone You Hire?

March 12, 2013 After a pile of backlash over her work-from-home ban, Marissa Mayer, the Yahoo CEO who can do no right, is now getting flack for trying to get the best people to work at her fledgling company, which might not be as ridiculous as it sounds. Just ask Sheryl Sandberg. At...

Commentary: The Ban on Cellphone Unlocking Has Gone Too Far

March 11, 2013 FROM NEXTGOV arrow In one of the industry's first effort to allay customer concerns since regulations went into effect six weeks ago that make it illegal to unlock your cellphone, AT&T is telling you to relax, they'll unlock it for you. As long as you do exactly what they say. Indeed, the newly...

How You Can Stop Webcam Hackers from Watching You

March 11, 2013 FROM NEXTGOV arrow There is one foolproof way to avoid an increasingly terrifying group of perverted cyberspies who are hijacking (mostly) women's computer cameras: Buy a new computer that has a light that goes on whenever your webcam is in use, whether you know it or not. [Update: Tape also works.] Ars Technica's...

Not All Work-from-Home Bans Are Created Equal

March 6, 2013 FROM NEXTGOV arrow So Best Buy announced this week that it, too, will start making its workers come in and — well, well — nobody is calling new white-male CEO Hubert Joly a bad feminist yet. What gives? When Yahoo CEO Marissa Mayer demanded last week that her workers actually come into work,...

Coolest Thing About Learning to Code Is Getting a Job

February 27, 2013 FROM NEXTGOV arrow In an attempt to get more schools to offer programming classes, Code.org has released a promotional video filled with celebrities and "celebrities" that basically says: learn code and you too can work in a hip Silicon Valley office. About three minutes into the video, Facebook CEO Mark Zuckerberg explains how...

You Will Be Warned: ISPs Roll Out Their Anti-Piracy Alert Systems

February 27, 2013 FROM NEXTGOV arrow After some delays, the movie industry's home-brewed system to fight Internet pirates has finally arrived, and depending on their internet service provider, pirates may not have all that much to fear. In light of the government's inability to pass legislation like SOPA and PIPA the Motion Picture Associate of America...

How to Avoid Getting Spear-Phished by China's Hackers Who Cracked Apple

February 20, 2013 FROM NEXTGOV arrow The tidal wave of Chinese hack attacks on the U.S. in recent weeks, from The New York Times and the Defense Department to Facebook and now even Apple, have one increasingly common and sophisticated type of malware trick in common: "spear-phishing." The tech giants seem to be the victim of...

Is the Facebook Hack Part of a Bigger Spy Threat?

February 19, 2013 FROM NEXTGOV arrow In the latest admission from a major company that it had been hacked, Facebook announced in a blog post on Friday afternoon that its "systems had been targeted in a sophisticated attack" and that "Facebook was not alone," which immediately raised the cyber-espionage question of the moment: Was China behind...

Why America Is Losing the War Against China's Hacker Spies

February 15, 2013 FROM NEXTGOV arrow Forget The New York Times and The Wall Street Journal. Chinese hackers are on a digital espionage campaign targeting a vast array of pretty much any major American organization "with intellectual property to protect," and now that there's a rare human side to combatting the malware attacks, we know there's...

Why Google Pays Apple $1 Billion a Year

February 13, 2013 FROM NEXTGOV arrow Google is expected to pay an estimated $1 billion to Apple in 2014 to keep its search engine as the default on iOS devices because, well, Google makes a huge portion of its mobile revenue from iPhones and iPads — enough to make rivalries disappear. Last year, Google paid $417...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.